I want to know how Facebook discovers the people who you know in real life or who know you.
I tried the following to see if Facebook can still discover my acquaintances in real life and suggest them ...

I just moved in a student flat where several students are using the same wifi connection. A few days ago the internet was very slow and a guy (son of the owner) came in to ask if I was downloading. He ...

I stumbled upon an interview with "the grugq" in which he is talking about how hackers anonymize their traffic, i.e. hide their original ip address (- this is also what I will mean by "anonymizing" in ...

This has become a bit of a thought experiment for me.
Suppose someone would like to establish a pseudonym along with a corresponding PGP Key, how could other people verify the correspondence between ...

Imagine alice posts her public PGP key on her website and bob encrypts a widget with that public key then sends it to alice over Tor. If alice's key is widely and publically available and an attacker ...

I read these questions which had great information: How can I keep my identity anonymous as a website owner/administrator? and How much can I trust Tor?, however I wonder if this is too extreme for my ...

I'm a tired of these stupid scammers trying to rip off fellow university students desperate for housing, so as for some free time activity I thought I'd try and do some scam baiting, and send him to ...

Another theoretical question about Tor: Imagine I am running a dissident web site as a hidden service. How can I reduce the chances that I get caught?
Assume I am running the server from home, over a ...

Summary
evil.example.com could use a hidden frame to request a CAS ticket from corporation.example.net, then validate it to receive the username of the hapless user. This effectively deanonymizes the ...

I am thinking about an anonimity network (just as tor), but using some type of guarantee against mis-usage. For example, which torrent does: there is a tracker, which registers who has given how much ...

I use to watch the status bar of my browser and note that when I visit a site many URLs are loaded like ajax[dot]googleapis or googlesyndicate[dot]com etc.
These URLs are not accessible directly by ...

I just asked myself that when you have bitcoin network, which is as we know "pseudo" anonym. Because of the transaction logs of the network (which are afaik endless), it seems that transactions are ...

I am wondering whether a website you are accessing can tell if you are using a VPN or not based on your IP address? I have done some Google research and it appears, that this is the case.
However, I ...

Can a website see my IMEI number? I have been banned from a website for multiple accounts, although I always cleared cookies, disconnected and reconnected from "the cloud" which gives me a different ...

This is one issue which I have came by in the world of Security, which I can not seamlessly wrap my head around. How is it a threat to one's security by showing them a picture of themselves to people ...

I want to know how to ensure the most complete anonymity when browsing the internet and connecting to remote servers: I want to be as anonymous and secret as possible. I don't know exactly how VPNs ...

In the United States, there has been a lot of talk about creating a secure polling system that would operate over the internet. I have also heard that Securing a poll over the Internet is impossible. ...

I think this is related to this question, but I would like to know if there's also a way to prevent "third party" applications from seeing hardware IDs (motherboard, hard disks, and others), or giving ...

Here is a scheme for deanonymizing a user that I've been thinking about, just out of curiosity. I tried searching for it but didn't find much. Does this technique have a name? Are there any papers or ...

I recently saw this post on reddit: http://www.slashgeek.net/2012/06/15/how-to-be-completely-anonymous-online/
But the majority argument, both on reddit and on comments on that post seems to be that ...

I'm working on a project whereby a certain level of anonymity is required for users. One of stipulations is that no email is used at all, as it makes the barrier to entry too high for people who want ...

I'm thinking about building a very anonymous forum, where people can comment and upvote each other's comments anonymously. People are supposed to remain anonymous even if the forum's database contents ...

I recently came across a paper called "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries" (Aaron Johnson et al) ... which seems to be saying that adversaries (like the NSA) that ...

I was searching for methods or tools to remain completely anonymous on the internet. TOR came up but it is seems that it is far from perfect. Are there any 100% foolproof ways ? Or approximately 100% ...

If a person uses VPN and authenticates herself to some social network through the VPN, doesn't she lose her anonymity for as long as the VPN session is used ? By losing her anonymity, I mean that her ...

I want to publish some information in my country that is in the public domain that is in
a hard to read format.
What are some reasonable steps I could take to help ensure I am not identified or make ...

Or is authentication essentially incompatible with anonymity?
If we have the idea that authentication is proving that someone is who they say they are and anonymity is essentially having an unknown ...